Which protocol works at the Internet layer and is
responsible for
making routing decisions?
A.) UDP
B.) IP
C.) TCP
D.) ARP
Answers were Sorted based on User's Feedback
Answer / guest
Answer: B
Internet Protocol - IP provides routing and a single
interface to the
upper layers. No upper layer protocol and now lower layer
protocol have
any functions relating to routing. IP receives segments from the
transport layer and fragments them into packets including
the hosts IP
address.
Is This Answer Correct ? | 10 Yes | 0 No |
Identify the command to view the configuration-register value? A.) show register B.) display config-register C.) show config D.) show version
Which three basic switch functions increase available bandwidth on the networks? (Choose three) A. loop avoidance B. address learning C. hop count limiting D. broadcast filtering E. packet forward/filtering
What will happen in OSPF, While a new highet priority DR joining in already running area.That area already having DR and BDR.
Identify command that configures 'Cisco1' as a secret password? A.) Router(config)# enable secret password Cisco1 B.) Router(config)# enable secret cisco1 C.) Router(config)# enable password Cisco1 D.) Router(config)# enable secret Cisco1
Which command should you use to create an IP standard access list? A. access-list standard 172.16.4.13 B. access-list 1 deny 172.16.4.13 0.0.0.0 C. access-list 100 deny 172.16.4.13 0.0.0.0 D. access-list 198 deny 172.16.4.13 255.255.255.255
In the setup dialog, what do the square brackets indicate? A. current or default spores B. hard coded values that cannot be modified C. values entered by the administrator but not saved D. values that must be written to PAVRAM before becoming enabled
What is the subnetmask of / 27 in network based and host based?
Which of the following is an example of the Physical Layer? A.) SQL B.) IP C.) LLC D.) DDP E.) Ethernet
What is etherchannel?
What is the difference between the user mode and the privileged mode?
Which two protocol tools use ICMP? (Choose two) A. ping B. telnet C. configure D. traceroute E. show commands F. standard access lists
Which ipsec rule is used for the olympia branch and what does it define?